← Volver a CVEs
CVE-2023-42753
HIGH7.0
Descripcion
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
Detalles CVE
Puntuacion CVSS v3.17.0
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadHIGH
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado9/25/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxlinux:linux_kernelredhat:enterprise_linux
Debilidades (CWE)
CWE-787CWE-787
Referencias
https://access.redhat.com/errata/RHSA-2023:7370(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7379(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7382(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7389(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7411(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7418(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7539(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7558(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0089(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0113(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0134(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0340(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0346(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0347(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0371(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0376(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0378(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0402(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0403(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0412(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0461(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0562(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0563(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0593(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0999(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2023-42753(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2239843(secalert@redhat.com)
https://seclists.org/oss-sec/2023/q3/216(secalert@redhat.com)
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7370(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7379(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7382(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7389(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7411(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7418(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7539(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7558(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0089(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0113(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0134(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0340(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0346(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0347(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0371(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0376(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0378(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0402(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0403(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0412(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0461(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0562(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0563(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0593(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0999(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/CVE-2023-42753(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2239843(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/oss-sec/2023/q3/216(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2023/09/22/10(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.